Making Routers Last Longer with ViAggre

Size: px
Start display at page:

Download "Making Routers Last Longer with ViAggre"

Transcription

1 Making Routers Last Longer with ViAggre Hitesh Ballani Cornell University Paul Francis Cornell University Tuan Cao Cornell University Jia Wang AT&T Labs Research Abstract This paper presents ViAggre (Virtual Aggregation), a configuration-only approach to shrinking the routing table on routers. ViAggre does not require any changes to router software and routing protocols and can be deployed independently and autonomously by any ISP. ViAggre is effectively a scalability technique that allows an ISP to modify its internal routing such that individual routers in the ISP s network only maintain a part of the global routing table. We evaluate the application of ViAggre to a few tier- and tier-2 ISPs and show that it can reduce the routing table on routers by an order of magnitude while imposing almost no traffic stretch and negligible load increase across the routers. We also deploy Virtual Aggregation on a testbed comprising of Cisco routers and benchmark this deployment. Finally, to understand and address concerns regarding the configuration overhead that our proposal entails, we implement a configuration tool that automates ViAggre configuration. While it remains to be seen whether most, if not all, of the management concerns can be eliminated through such automated tools, we believe that the simplicity of the proposal and its possible short-term impact on routing scalability suggest that it is an alternative worth considering. I. Introduction The Internet default-free zone (DFZ) routing table has been growing rapidly for the past few years [2]. Looking ahead, there are concerns that as the IPv4 address space runs out, hierarchical aggregation of network prefixes will further deteriorate resulting in a substantial acceleration in the growth of the routing table [3]. A growing IPv6 deployment would worsen the situation even more [29]. The increase in the size of the DFZ routing table has several harmful implications for inter-domain routing. [3] discusses these in detail. At a technical level, increasing routing table size may drive highend router design into various engineering limits. For instance, while memory and processing speeds might just scale with a growing routing system, power and heat dissipation capabilities may not [3]. On the business side, the performancerequirementsforforwardingwhile being able to access a large routing table imply that the cost of forwarding packets increases and hence, networks become less cost-effective [27]. Further, it makes provisioning of networks harder since it is difficult to estimate the usable lifetime of routers, not to mention the cost of the actual upgrades. As a matter of fact, instead of upgrading their routers, a few ISPs have resorted to filtering out some small prefixes (mostly /24s) which implies that parts of the Internet may not have reachability to each other [9]. This suggests that ISPs are willing to undergo some pain to avoid the cost of router upgrades. Such concerns regarding FIB size growth, along with problems arising from a large RIB and the concomitant convergence issues, were part of the reasons that led a recent Internet Architecture Board workshop to conclude that scaling the routing system is one of the most critical challenges of near-term Internet design [3]. The severity of these problems has also prompted a slew of routing proposals [7,8,,4,8,29,32,4]. All these proposals require changes in the routing and addressing architecture of the Internet. This, we believe, is the nature of the beast since some of the fundamental Internet design choices limit routing scalability; the overloading of IP addresses with who and where semantics represents a good example [3]. However, the very fact that they require architectural change has contributed to the non-deployment of these proposals. This paper takes the position that a major architectural change is unlikely and it may be more pragmatic to approach the problem through a series of incremental, individually cost-effective upgrades. Guided by this and the aforementioned implications of a rapidly growing DFZ FIB, this paper proposes Virtual Aggregation or ViAggre, a scalability technique that focuses primarily on shrinking the FIB size on routers. ViAggre is a configuration-only solution that applies to legacy routers. Further, ViAggre can be adopted independently and autonomously by any ISP and hence the bar for its deployment is much lower. The key idea behind ViAggre is very simple: an ISP adopting ViAggre divides the responsibility for maintaining the global routing table amongst its routers such that individual routers only maintain a part of the routing table. Thus, this paper makes the following contributions: We discuss two deployment options through which an ISP can adopt ViAggre. The first one uses FIB USENIX Association NSDI 9: 6th USENIX Symposium on Networked Systems Design and Implementation 43

2 suppression to shrink the FIB of all the ISP s routers while the second uses route filtering to shrink both the FIB and RIB on all data-path routers. We analyze the application of ViAggre to an actual tier- ISP and several inferred (Rocketfuel [37]) ISP topologies. We find that ViAggre can reduce FIB size by more than an order of magnitude with negligible stretch on the ISP s traffic and very little increase in load across the ISP s routers. Based on predictions of future routing table growth, we estimate that ViAggre can be used to extend the life of already outdated routers by more than years. We propose utilizing the notion of prefix popularity to reduce the impact of ViAggre on the ISP s traffic and use a two-month study of a tier- ISP s traffic to show the feasibility of such an approach. As a proof-of-concept, we configure test topologies comprising of Cisco routers (on WAIL [3]) according to the ViAggre proposal. We use the deployment to benchmark the control-plane processing overhead that ViAggre entails. One of the presented designs actually reduces the amount of processing done by routers and preliminary results show that it can reduce convergence time too. The other design has high overhead due to implementation issues and needs more experimentation. ViAggre involves the ISP reconfiguring its routers which can be a deterrent to adoption. We quantify this configuration overhead. We also implement a configuration tool that, given the ISPs existing configuration files, can automatically generate the configuration files needed for ViAggre deployment. We discuss the use of this tool on our testbed. Overall, the incremental version of ViAggre that this paper presents can be seen as little more than a simple and structured hack that assimilates ideas from existing work including, but not limited to, VPN tunnels and CRIO [4]. We believe that its very simplicity makes ViAggre an attractive short-term solution that provides ISPs with an alternative to upgrading routers in order to cope with routing table growth till more fundamental, long-term architectural changes can be agreed upon and deployed in the Internet. However, the basic ViAggre idea can also be applied in a clean-slate fashion to address routing concerns beyond FIB growth. While we defer the design and the implications of such a non-incremental ViAggre architecture for future work, the notion that the same concept has potential both as an immediate alleviative and as the basis for a nextgeneration routing architecture seems interesting and worth exploring. II. ViAggre design ViAggre allows individual ISPs in the Internet s DFZ to do away with the need for their routers to maintain routes for all prefixes in the global routing table. An ISP adopting ViAggre divides the global address space into a set of virtual prefixes such that the virtual prefixes are larger than any aggregatable (real) prefix in use today. So, for instance, an ISP could divide the IPv4 address space into 28 parts with a /7 virtual prefix representing each part (.../7 to 24.../7). Note that such a naïve allocation would yield an uneven distribution of real prefixes across the virtual prefixes. However, the virtual prefixes need not be of the same length and hence, the ISP can choose them such that they contain a comparable number of real prefixes. The virtual prefixes are not topologically valid aggregates, i.e. there is not a single point in the Internet topology that can hierarchically aggregate the encompassed prefixes. ViAggre makes the virtual prefixes aggregatable by organizing virtual networks, one for each virtual prefix. In other words, a virtual topology is configured that causes the virtual prefixes to be aggregatable, thus allowing for routing hierarchy that shrinks the routing table. To create such a virtual network, some of the ISP s routers are assigned to be within the virtual network. These routers maintain routes forall prefixes in the virtual prefix corresponding to the virtual network and hence, are said to be aggregation points for the virtual prefix. A router can be an aggregation point for multiple virtual prefixes and is required to only maintain routes for prefixes in the virtual prefixes it is aggregating. Given this, a packet entering the ISP s network is routed to a close-by aggregation point for the virtual prefix encompassing the actual destination prefix. This aggregation point has a route for the destination prefix and forwards the packet out of the ISP s network in a tunnel. In figure (figure details explained later), router C is an aggregation point for the virtual prefix encompassing the destination prefix and B C D is one such path through the ISP s network. A. Design Goals The discussion above describes ViAggre at a conceptual level. While the design space for organizing an ISP s network into virtual networks has several dimensions, this paper aims for deployability and hence is guided by two major design goals: ) No changes to router software and routing protocols: The ISP should not need to deploy new data-plane or control-plane mechanisms. 2) Transparent to external networks: An ISP s decision to adopt the ViAggre proposal should not impact its interaction with its neighbors (customers, peers and providers). 44 NSDI 9: 6th USENIX Symposium on Networked Systems Design and Implementation USENIX Association

3 These goals, in turn, limit what can be achieved through the ViAggre designs presented here. Routers today have a Routing Information Base (RIB) generated by the routing protocols and a Forwarding Information Base (FIB) that is used for forwarding the packets. Consequently, the FIB is optimized for looking up destination addresses and is maintained on fast(er) memory, generally on the line cards themselves [3]. All things being equal, it would be nice to shrink both the RIB and the FIB for all ISP devices, as well as make other improvements such as shorter convergence time. While the basic ViAggre idea can be used to achieve these benefits (section VI), we have not been able to reconcile them with the aforementioned design goals. Instead, this paper is based on the hypothesis that given the performance and monetary implications of the FIB size for routers, an immediately deployable solution that reduces FIB size is useful. Actually, one of the presented designs also shrinks the RIB on routers; only components that are off the data path (i.e. route reflectors) need to maintain the full RIB. Further, this design is shown to help with route convergence time too. B. Design-I: FIB Supression This section details one way an ISP can deploy virtual prefix based routing while satisfying the goals specified in the previous section. The discussion below applies to IPv4 (and BGPv4) although the techniques detailed here work equally well for IPv6. The key concept behind this design is to operate the ISP s internal distribution of BGP routes untouched and in particular, to populate the RIB on routers with the full routing table but to suppress most prefixes from being loaded in the FIB of routers. A standard feature on routers today is FIB Suppression which can be used to prevent routes for individual prefixes in the RIB from being loaded into the FIB. We have verified support for FIB suppression as part of our ViAggre deployment on Cisco 73 and 2 routers. Documentation for Juniper [43] and Foundry [42] routers specify this feature too. We use this as described below. The ISP does not modify its routing setup the ISP s routers participate in an intra-domain routing protocol that establishes internal routes through which the routers can reach each other while BGP is used for inter-domain routing just as today. For each virtual prefix, the ISP designates some number of routers to serve as aggregation points for the prefix and hence, form a virtual network. Each router is configured to only load prefixes belonging to the virtual prefixes it is aggregating into its FIB while suppressing all other prefixes. Given this, the ISP needs to ensure that packets to any prefix can flow through the network in spite of the fact that only a few routers have a route to the prefix. This is achieved as follows: Connecting Virtual Networks. Aggregation points for a virtual prefix originate a route to the virtual prefix that is distributed throughout the ISP s network but not outside. Specifically, an aggregation point advertises the virtual prefix to its ibgp peers. A router that is not an aggregation point for the virtual prefix would choose the route advertised by the aggregation point closest to it and hence, forward packets destined to any prefix in the virtual prefix to this aggregation point. 2 Sending packets to external routers. When a router receives a packet destined to a prefix in a virtual prefix it is aggregating, it can look up its FIB to determine the route for the packet. However, such a packet cannot be forwarded in the normal hop-by-hop fashion since a router that is not an aggregation point for the virtual prefix in question might forward the packet back to the aggregation point, resulting in a loop. Hence, the packet must be tunneled from the aggregation point to the external router that was selected as the BGP NEXT HOP. While the ISP can probably choose from many tunneling technologies, we use MPLS Label Switched Paths (LSPs) forsuch tunnels.this choicewas influenced by the fact that MPLS is widely supported in routers, is used by ISPs, and operates at wire speed. Further, protocols like LDP [] automate the establishment of MPLS tunnels and hence, reduce the configuration overhead. However, a LSP from the aggregation point to an external router would require cooperation from the neighboring ISP. To avoid this, every edge router of the ISP initiates a LSP for every external router it is connected to. Thus, all the ISP routers need to maintain LSP mappings equal to the number of external routers connected to the ISP, a number much smaller than the routes in the DFZ routing table (we relax this constraint in section IV-B). Note that even though the tunnel endpoint is the external router, the edge router can be configuredto strip the MPLS label from the data packets before forwarding them onto the external router. This, in turn, has two implications. First, external routers don t need to be aware of the adoption of ViAggre by the ISP. Second, even the edge router does not need a FIB entry for the destination prefix, instead it chooses the external router to forward the packets to based on the MPLS label of the packet. The behavior of the edge router here is similar to the penultimate hop in a VPN scenario and is achieved through standard configuration. We now use a concrete example to illustrate the flow of USENIX Association NSDI 9: 6th USENIX Symposium on Networked Systems Design and Implementation 4

4 (Ingress) (External) A B B s FIB Prefix Next-Hop 4/7 C ISP (Egress) C (External) 2 D 3 E C s FIB Prefix Next-Hop 4/24 E 4/7 Null E/32 LSP with label l D s LSP Map Label Next-Hop Fig.. Path of packets destined to prefix 4.../24 (or, 4/24) between external routers A and E through an ISP with ViAggre. Router C is an aggregation point for virtual prefix 4.../7 (or, 4/7). packets through an ISP network that is using ViAggre. Figure shows the relevant routers. The ISP is using /7s as virtual prefixes and router C is an aggregation point for one such virtual prefix 4.../7. Edge router D initiates a LSP to external router E with label l and hence, the ISP s routers can get to E through MPLS tunneling. The figure shows the path of a packet destined to prefix 4.../24, which is encompassed by 4.../7, through the ISP s network. The path from the ingress router B to the external router E comprises three segments: ) VP-routed: Ingress router B is not an aggregation point for 4.../7 and hence, forwards the packet to aggregation point C. 2) MPLS-LSP: Router C, being an aggregation point for 4.../7, has a route for 4.../24 with BGP NEXT HOP set to E. Further, the path to router E involves tunneling the packet with MPLS label l. 3) Map-routed: On receiving the tunneled packet from router C, egress router D looks up its MPLS label map, strips the MPLS header and forwards the packet to external router E. C. Design-II: Route Reflectors The second design offloads the task of maintaining the full RIB to devices that are off the data path. Many ISPs use route-reflectors for scalable internal distribution of BGP prefixes and we require only these route-reflectors to maintain the full RIB. For ease of exposition, we assume that the ISP is already using per- PoP route reflectors that are off the data path, a common deployment model for ISPs using route reflectors. In the proposed design, the external routers connected to a PoP are made to peer with the PoP s routereflector. This is necessary since the external peer may be advertising the entire DFZ routing table and we don t want all these routes to reside on any given data-plane router. The route-reflector also has ibgp peerings with other route-reflectors and with the routers in its PoP. Egress filters are used on the route-reflector s peerings with the PoP s routers to ensure that a router only gets l E routes for the prefixes it is aggregating. This shrinks both the RIB and the FIB on the routers. The dataplane operation and hence, the path of packets through the ISP s network remains the same as with the previous design. With this design, a PoP s route-reflector peers with all the external routers connected to the PoP. The RIB size on a BGP router depends on the number of peers it has and hence, the RIB for the route-reflectors can potentially be very large. If needed, the RIB requirements can be scaled by using multiple route-reflectors which may also be needed to provide customised routes to the PoP s neighbors. Note that the RIB scaling properties here are better than in the status quo. Today, edge routers have no choice but to peer with the directly connected external routers and maintain the resulting RIB. Replicating these routers is prohibitive because of their cost but the same does not apply to off-path routereflectors, which could even be BGP software routers. D. Design Comparison As far as the configuration is concerned, configuring suppression of routes on individual routers in design-i is comparable, at least in terms of complexity, to configuring egress filters on the route-reflectors. In both cases, the configuration can be achieved through BGP routefiltering mechanisms (access-lists, prefix-lists, etc.). Design-II, apart from shrinking the RIB on the routers, does not require the route suppression feature on routers. Further, as we detail in section V-B, design- II reduces the ISP s route propagation time while the specific filtering mechanism used in design-i increases it. However, design-ii does require the ISP s ebgp peerings to be reconfigured which, while straightforward, violates our goal of not impacting neighboring ISPs. E. Network Robustness ViAggre causes packets to be routed through an aggregation point which leads to robustness concerns. When an aggregation point for a virtual prefix fails, routers using that aggregation point are re-routed to another aggregation point through existing mechanisms without any explicit configuration by the ISP. In case of design-i, a router has routes to all aggregation points for a given virtual prefix in its RIB and hence, when the aggregation point being used fails, the router installs the second closest aggregation point into its FIB and packets are re-routed almost instantly. With design- II, it is the route-reflector that chooses the alternate aggregation point and advertises this to the routers in its PoP. Hence, as long as another aggregation point exists, failover happens automatically and at a fast rate. 46 NSDI 9: 6th USENIX Symposium on Networked Systems Design and Implementation USENIX Association

5 F. Routing popular prefixes natively The use of aggregation points implies that packets in ViAggre may take paths that are longer than native paths. Apart from the increased path length, the packets may incur queuing delay at the extra hops. The extra hops also result in an increase in load on the ISP s routers and links and a modification in the distribution of traffic across them. Past studies have shown that a large majority of Internet traffic is destined to a very small fraction of prefixes [,3,34,38]. The fact that routers today have no choice but to maintain the complete DFZ routing table implies that this observation wasn t very useful for routing configuration. However, with ViAggre, individual routers only need to maintain routes for a fraction of prefixes. The ISP can thus configure its ViAggre setup such that the small fraction of popular prefixes are in the FIB of every router and hence, are routed natively. For design-i, this involves configuring each router with a set of popular prefixes that should not be suppressed from the FIB. For design-ii, a PoP s route-reflector can be configured to not filter advertisements for popular prefixes from the PoP s routers. Beyond this, the ISP may also choose to install customer prefixes into its routers such that they don t incur any stretch. The rest of the proposal involving virtual prefixes remains the same and ensures that individual routers only maintain routes for a fraction of the unpopular prefixes. In section IV- B.4, we analyze Netflow data from a tier- ISP network to show that not only such an approach is feasible, it also addresses all the concerns raised above. III. Allocating aggregation points An ISP adopting ViAggre would obviously like to minimise the stretch imposed on its traffic. Ideally, an ISP would deploy an aggregation point for all virtual prefixes in each of its PoPs. This would ensure that for every virtual prefix, a router chooses the aggregation point in the same PoP and hence, the traffic stretch is minimal. However, this may not be possible in practice. This is because ISPs, including tier- ISPs, often have some small PoPs with just a few routers and therefore there may not be enough cumulative FIB space in the PoP to hold all the actual prefixes. More generally, ISPs may be willing to bear some stretch for substantial reductions in FIB size. To achieve this, the ISP needs to be smart about the way it designates routers to aggregate virtual prefixes and in this section we explore this choice. A. Problem Formulation We first introduce the notation used in the rest of this section. Let T represent the set of prefixes in the Internet routing table, R be the set of ISP s routers and X is the set of external routers directly connected to the ISP. For each r R, P r represents the set of popular prefixes for routerr. V is the set of virtual prefixes chosen by the ISP and for each v V, n v is the number of prefixes in v. We use two matrices, D = (d i,j ) that gives the distance between routers i and j and W = (w i,j ) that gives the IGP metric for the IGP-established path between routers i and j. We also define two relations: BelongsTo relation B: T V such that B(p)=v if prefix p belongs to or is encompassed by virtual prefix v. Egress relation E: R x T R such that E(i, p)=j if traffic to prefix p from router i egresses at router j. The mapping relation A: R 2 V captures how the ISP assigns aggregation points; i.e. A(r) = {v... v n } implies that router r aggregates virtual prefixes {v... v n }. Given this assignment, we can determine the aggregation point any router uses for its traffic to each virtual prefix. This is captured by the Use relation U: R x V R where U(i, v) = j or router i uses aggregation point j for virtual prefix v if the following conditions are satisfied: ) v A(j) 2) w i,j w i,k k R, v A(k) Here, condition ) ensures that router j is an aggregation point for virtual prefix v. Condition 2) captures the operation of BGP with design-i and ensures that a router chooses the aggregation point that is closest in terms of IGP metrics. 3 Using this notation, we can express the FIB size on routers and the stretch imposed on traffic. ) Routing State: In ViAggre, a router needs to maintain routes to the (real) prefixes in the virtual prefixes it is aggregating, routes to all the virtual prefixes themselves and routes to the popular prefixes. Further, the router needs to maintain LSP mappings for LSPs originated by the ISP s edge routers with one entry for each external router connected to the ISP. Hence, the routing state for the router r, hereon simply referred to as the FIB size (F r ), is given by: F r = n v + V + P r + X v A(r) The Worst FIB size and the Average FIB size are defined as follows: Worst FIB size = max r R (F r ) Average FIB size = r R (F r )/ R 2) Traffic Stretch: If router i uses router k as an aggregation point for virtual prefix v, packets from router i to a prefix p belonging to v are routed through router k. Hence, the stretch (S) imposed on traffic to USENIX Association NSDI 9: 6th USENIX Symposium on Networked Systems Design and Implementation 47

6 prefix p from router i is given by: S i,p =, p P i = (d i,k + d k,j d i,j), p (T P i), v = B(p) k = U(i, v) & j = E(k, p) The Worst Stretch and Average Stretch are defined as follows: Worst Stretch = max i R,p T (S i,p ) Average Stretch = (S i,p )/( R T ) i R,p T Problem: ViAggre, through the use of aggregation points, trades off an increase in path length for a reduction in routing state. The ISP can use the assignment of aggregation points as a knob to tune this trade-off. Here we consider the simple goal of minimising the FIB Size on the ISP s routers while bounding the stretch. Specifically, the ISP needs to assign aggregation points by determining a mapping A that min s.t. Worst FIB Size Worst Stretch C where C is the specified constraint on Worst Stretch. Note that much more complex formulations are possible. Our focus on worst-case metrics is guided by practical concerns the Worst FIB Size dictates how the ISP s routers need to be provisioned while the Worst Stretch characterizes the most unfavorable impact of the use of ViAggre. Specifically, bounding the Worst Stretch allows the ISP to ensure that its existing SLAs are not breached and applications sensitive to increase in latency (example, VOIP) are not adversely affected. B. A Greedy Solution The problem of assigning aggregation points while satisfying the conditions above can be mapped to the MultiCommodity Facility Location (MCL) problem [33]. MCL is NP-hard and [33] presents a logarithmic approximation algorithm for it. Here we discuss a greedy approximation solution to the problem, similar to the algorithm in [2]. The first solution step is to determine that if router i were to aggregate virtual prefix v, which routers can it serve without violating the stretch constraint. This is the can serve i,v set and is defined as follows: can serve i,v = {j j R, ( p T, B(p) = v, E(i, p) = k, (d j,i + d i,k d j,k ) C)} Given this, the key idea behind the solution is that any assignment based on the can serve relation will have Worst Stretch less than C. Hence, our algorithm designates routers to aggregate virtual prefixes in accordance with the can serve relation while greedily trying to minimise the Worst FIB Size. The algorithm, shown below, stops when each router can be served by at least one aggregation point for each virtual prefix. W orst F IB Size= for all r in R do for all v in V do Calculate can serve r,v Sort V in decreasing order of n v for all v in V do Sort R in decreasing order of can serve r,v repeat for all r in R do if (F r + n v ) W orst F IB Size then A[r]=A[r] v # Assign v to r F r = F r + n v # r s FIB size increases Mark all routers in can serve r,v as served if All routers are served for v then break if All routers are not served for v then # W orst F IB Size needs to be raised for all r in R do if v / A[r] then # r is not an aggregation point for v A[r]=A[r] v F r = F r + n v W orst F IB Size = F r break until All Routers are served for virtual prefix v IV. Evaluation In this section we evaluate the application of ViAggre to a few Internet ISPs. A. Metrics of Interest We defined (Average and Worst) FIB Size and Stretch metrics in section III-A. Here we define other metrics that we use for ViAggre evaluation. ) Impact on Traffic: Apart from the stretch imposed, another aspect of ViAggre s impact is the amount of traffic affected. To account for this, we define traffic impacted as the fraction of the ISP s traffic that uses a different router-level path than the native path. Note that in many cases, a router will use an aggregation point for the destination virtual prefix in the same PoP and hence, the packets will follow the same PoP-level path as before. Thus, another metric of interest is the traffic stretched, the fraction of traffic that is forwarded along a different PoP-level path than before. In effect, this represents the change in the distribution of traffic across the ISP s inter-pop links and hence, captures how ViAggre interferes with the ISP s inter-pop traffic engineering. 2) Impact on Router Load: The extra hops traversed by traffic increases the traffic load on the ISP s routers. We define the load increase across a router as the extra 48 NSDI 9: 6th USENIX Symposium on Networked Systems Design and Implementation USENIX Association

7 traffic it needs to forward due to ViAggre, as a fraction of the traffic it forwards natively. B. Tier- ISP Study We analysed the application of ViAggre to a large tier- ISP in the Internet. For our study, we obtained the ISP s router-level topology (to determine router set R) and the routing tables of routers (to determine prefix set T and the Egress E and BelongsTo B relations). We used information about the geographical locations of the routers to determine the Distance matrix D such that d i,j is if routers i and j belong to the same PoP (and hence, are in the same city) else d i,j is set to the propagation latency corresponding to the great circle distance between i and j. Further, we did not have information about the ISP s link weights. However, guided by the fact that intra-domain traffic engineering is typically latency-driven [36], we use the Distance matrix D as the Weight matrix W. We also obtained the ISP s traffic matrix; however, in order to characterise the impact of vanilla ViAggre, the first part of this section assumes that the ISP does not consider any prefixes as popular. ) Deployment decisions: The ISP, in order to adopt ViAggre, needs to decide what virtual prefixes to use and which routers aggregate these virtual prefixes. We describe the approaches we evaluated. Determining set V. The most straightforward way to select virtual prefixes while satisfying the two conditions specified in section II is to choose large prefixes (/6s, /7s, etc.) as virtual prefixes. We assume that the ISP uses /7s as its virtual prefixes and refer to this as the /7 allocation. However, such selection of virtual prefixes could lead to a skewed distribution of (real) prefixes across them with some virtual prefixes containing a large number of prefixes. For instance, using /7s as virtual prefixes implies that the largest virtual prefix (22.../7) contains 22,772 of the prefixes in today s BGP routing table or 8.9% of the routing table. Since at least one ISP router needs to aggregate each virtual prefix, such large virtual prefixes would inhibit the ISP s ability to reduce the Worst FIB size onits routers. However, aswe mentioned earlier, the virtual prefixes need not be of the same length and so large virtual prefixes can be split to yield smaller virtual prefixes. To study the effectiveness of this approach, we started with /7s as virtual prefixes and split each of them such that the resulting virtual prefixes were still larger than any prefix in the Internet routing table. This yielded 24 virtual prefixes with the largest containing 4, prefixes or.78% of the BGP routing table. We also use this virtual prefix allocation for our evaluation and refer to it as Uniform Allocation. FIB Size (% of DFZ routing table) 2 /7 Uniform LSP mappings VPs (Real) Prefixes /7 Virtual Prefix Allocation Scheme Uniform Fig. 2. FIB composition for the router with the largest FIB, C=4ms and no popular prefixes. Determining mapping A. We implemented the algorithm described in section III-B and use it to designate routers to aggregate virtual prefixes. 2) Router FIB: We first look at the size and the composition of the FIB on the ISP s routers with a ViAggre deployment. Specifically, we focus on the router with the largest FIB for a deployment where the worst-case stretch (C) is constrained to 4ms. The first two bars in figure 2 show the FIB composition for a /7 and uniform allocation respectively. With a /7 allocation, the router s FIB contains 46,43 entries which represents 8.2% of the routing table today. This includes 22,772 prefixes, 28 virtual prefixes, 23,643 LSP mappings and popular prefixes. As can be seen, in both cases, the LSP mappings for tunnels to the external routers contribute significantly to the FIB. This is because the ISP has a large number of customer routers that it has peerings with. However, we also note that customer ISPs do not advertise the full routing table to their provider. Hence, edge routers of the ISP could maintain routes advertised by customer routers in their FIB, advertise these routes onwards with themselves as the BGP NEXT HOP and only initiate LSP advertisements for themselves and for peer and provider routers connected to them. With such a scheme, the number of LSP mappings that the ISP s routers need to maintain and the MPLS overhead in general reduces significantly. The latter set of bars in figure 2 shows the FIB composition with such a deployment for the router with the largest FIB. For the /7 allocation, the Worst FIB size is 23, entries (9.2% of today s routing table) while for the Uniform allocation, it is,226 entries (4.47%). In the rest of this section, we assume this model of deployment. 3) Stretch Vs. FIB Size: We ran the assignment algorithm with Worst Stretch Constraint (C) ranging from to ms and determined the (Average and Worst) Stretch and FIB Size of the resulting ViAggre deployment. Figure 3(a) plots these metrics for the /7 allocation. The Worst FIB size, shown as a fraction of the DFZ routing table size today, expectedly reduces as the constraint on Worst Stretch is relaxed. However, beyond C=4ms, the Worst FIB Size remains constant. This is because the largest virtual prefix with a /7 allocation encompasses 8.9% of the DFZ routing table and the USENIX Association NSDI 9: 6th USENIX Symposium on Networked Systems Design and Implementation 49

8 FIB Size (% of DFZ routing table) FIB Size (% of DFZ routing table) Worst FIB Size Average FIB Size Worst Stretch Average Stretch Worst Stretch Constraint (msec) (a) With /7 allocation Worst FIB Size Average FIB Size Worst Stretch Average Stretch Worst Stretch Constraint (msec) (b) With Uniform allocation Fig. 3. Variation of FIB Size and Stretch with Worst Stretch constraint and no popular prefixes. Today ViAggre Worst Stretch (ms) 239K Quad. Fit Expired FIB Expo. Fit Expired M Quad. Fit FIB Expo. Fit TABLE I ESTIMATES FOR ROUTER LIFE WITH VIAGGRE Worst FIB Size cannot be any less than 9.2% (.2% overhead is due to virtual prefixes and LSP mappings). Figure 3(b) plots the same metrics for the Uniform allocation and shows that the FIB can be shrunk even more. The figure also shows that the Average FIB Size and the Average stretch are expectedly small throughout. The anomalybeyondc=8msec in figure3(b) results from the fact that our assignment algorithm is an approximation that can yield non-optimal results. Another way to quantify the benefits of ViAggre is to determine the extension in the life of a router with a specified memory due to the use of ViAggre. As proposed in [2], we used data for the DFZ routing table size from Jan 2 to Dec 7 [2] to fit a quadratic model to routing table growth. Further, it has been claimed that the DFZ routing table has seen exponential growth at the rate of.3x every two years for the past few years and will continue to do so [3]. We use these models to extrapolate future DFZ routing table size. We consider two router families: Cisco s Cat6 series with a supervisor 72-3B forwarding engine that can hold upto 239K IPv4 FIB entries and hence, was supposed to be phased out by mid-27 [6], though some ISPs still continue to use them. We also consider Cisco s current generation of routers with a supervisor 72-3BXL engine that can hold M IPv4 FIB entries Stretch (msec) Stretch (msec) % of Traffic Stretched and Impacted... Traffic Stretched Traffic Impacted Median Load Increase Worst Stretch Constraint C (msec) Fig. 4. Variation of the percentage of traffic stretched/impacted and load increase across routers with Worst Stretch Constraint (Uniform Allocation) and no popular prefixes. For each of these router families, we calculate the year to which they would be able to cope with the growth in the DFZ routing table with the existing setup and with ViAggre. Table I shows the results for the Uniform Allocation. For ViAggre, relaxing the worst-case stretch constraints reduces FIB size and hence, extends the router life. The table shows that if the DFZ routing table were to grow at the aforementioned exponential rate, ViAggre can extend the life of the previous generation of routers to 28 with no stretch at all. We realise that estimates beyond a few years are not very relevant since the ISP would need to upgradeits routers forotherreasons such as newer technologies and higher data rates anyway. However, with ViAggre, at least the ISP is not forced to upgrade due to growth in the routing table. Figure 4 plots the impact of ViAggre on the ISP s traffic and router load. The percentage of traffic stretched is small, less than % for C 6 ms. This shows that almost all the traffic is routed through an aggregation point in the same PoP as the ingress. However, the fact that no prefixes are considered popular implies that almost all the traffic follows a different router-level path as compared to the status quo. This shows up in figure 4 since the traffic impacted is % throughout. This, in turn, results in a median increase in load across the routers by 39%. In the next section we discuss how an ISP can use the skewed distribution of traffic to address the load concern while maintaining a small FIB on its routers. 4) Popular Prefixes: Past studies of ISP traffic patterns from as early as 999 have observed that a small fraction of Internetprefixes carry a largemajority of ISP traffic [,3,34,38]. We used Netflow records collected across the routers of the same tier- ISP as in the last section for a period of two months (2 th Nov 7 to 2 th Jan 7) to generate per-prefix traffic statistics and observed that this pattern continues to the present day. The line labeled Day-based, ISP-wide in figure plots the average fraction of the ISP s traffic destined to a given fraction of popular prefixes when the set of popular prefixes is calculated across the ISP on a daily basis. The figure shows that.% of most popular prefixes carry 7.% of the traffic while % of the prefixes carry 9.2% of the traffic Load Increase (%) 46 NSDI 9: 6th USENIX Symposium on Networked Systems Design and Implementation USENIX Association

9 % of Traffic Carried Fig Day-based, ISP-wide Day-based, per-pop Estimate, per-pop % of Popular Prefixes 2 Popular prefixes carry a large fraction of the ISP s traffic. ViAggre exploits the notion of prefix popularity to reduce its impact on the ISP s traffic. However, the ISP s routers need not consider the same set of prefixes as popular; instead the popular prefixes can be chosen per- PoP or even per-router. We calculated the fraction of traffic carried by popular prefixes, when popularity is calculated separately for each PoP on a daily basis. This is plotted in the figure as Day-based, per-pop and the fractions are even higher. When using prefix popularity for router configuration, it would be preferable to be able to calculate the popular prefixes over a week, month, or even longer durations. The line labeled Estimate, per-pop in the figure shows the amount of traffic carried to prefixes that are popular on a given day over the period of the next month, averaged over each day in the first month of our study. As can be seen, the estimate based on prefixes popular on any given day carries just a little less traffic as when the prefix popularity is calculated daily. This suggests that prefix popularity is stable enough for ViAggre configuration and the ISP can use the prefixes that are popular on a given day for a month or so. However, we admit that that these results are very preliminary and we need to study ISP traffic patterns over a longer period to substantiate the claims made above. ) Load Analysis: We now consider the impact of a ViAggre deployment involving popular prefixes, i.e. the ISP populates the FIB on its routers with popular prefixes. Specifically, we focus on a deployment wherein the aggregation points are assigned to constrain Worst Stretch to 4ms, i.e. C = 4ms. Figure 6 shows how the traffic impacted and the quartiles for the load increase vary with the percentage of popular prefixes for both allocations. Note that using popular prefixes increases the router FIB size by the number of prefixes considered popular and thus, the upper X-axis in the figure shows the Worst FIB size. The large fraction of traffic carried by popular prefixes implies that both the traffic impacted and the load increase drops sharply even when a small fraction of prefixes is considered popular. For instance, with 2% popular prefixes in case of the uniform allocation (figure 6(b)), 7% of the traffic follows a different router-level path than before while the largest load increase is 3.% of the original router load. With % popular prefixes, the largest load increase % of Traffic Impacted % of Traffic Impacted.. Worst FIB size (% of DFZ routing table) Traffic Impacted Increased Load Quartiles % of Popular Prefixes (a) With /7 allocation % of Popular Prefixes 29 2 Worst FIB size (% of DFZ routing table) Traffic Impacted Increased Load Quartiles Load Increase (% of native load) Load Increase (% of native load) (b) With Uniform allocation Fig. 6. Variation of Traffic Impacted and Load Increase ( percentile) with percentage of popular prefixes, C=4ms. FIB Size (% of DFZ routing table) Average Worst Telstra Sprint Ebone NTT Tiscali GX Exodus VSNL Above- ATT ISP -net Fig. 7. FIB size for various ISPs using ViAggre. is.38%. Note that the more even distribution of prefixes across virtual prefixes in the uniform allocation results in a more even distribution of the excess traffic load across the ISP s routers this shows up in the load quartiles being much smaller in figure 6(b) as compared to the ones in figure 6(a). C. Rocketfuel Study We studied the topologies of ISPs collected as part of the Rocketfuel project [37] to determine the FIB size savings that ViAggre would yield. Note that the fact we don t have traffic matrices for these ISPs implies that we cannot analyze the load increase across their routers. For each ISP, we used the assignment algorithm to determine the worst FIB size resulting from a ViAggre deployment where the worst stretch is limited to ms. Figure 7 shows that the worst FIB size is always less than % of the DFZ routing table. However, the Rocketfuel topologies are not complete and are missing routers. Hence, while the results presented here are encouraging, they should be treated as conservative estimates of the savings that ViAggre would yield for these ISPs. USENIX Association NSDI 9: 6th USENIX Symposium on Networked Systems Design and Implementation 46

10 AS2 R R (VP) RR PoP R2 (VP2) (VP) R3 RR2 PoP2 R6 R4 (VP2) AS3 Fig. 8. WAIL topology used for our deployment. All routers in the figure are Cisco 73s. RR and RR2 are route-reflectors and are not on the data path. Routers R and R3 aggregate virtual prefix VP while routers R2 and R4 aggregate VP2. D. Discussion The analysis above shows that ViAggre can significantly reduce FIB size. Most of the ISPs we studied are large tier- and tier-2 ISPs. However, smaller tier- 2 and tier-3 ISPs are also part of the Internet DFZ. Actually, it is probably more important for such ISPs to be able to operate without needing to upgrade to the latest generation of routers. The fact that these ISPs have small PoPs might suggest that ViAggre would not be very beneficial. However, given their small size, the PoPs of these ISPs are typically geographically close to each other. Hence, it is possible to use the cumulative FIB space across routers of close-by PoPs to shrink the FIB substantially. And the use of popular prefixes ensures that the load increase and the traffic impact is still small. For instance, we analyzed router topology and routing table data from a regional tier-2 ISP (AS2497) and found that a ViAggre deployment with worst stretch less than ms can shrink the Worst FIB size to 4.2% of the routing table today. Further, the fact that such ISPs are not tier- ISPs implies they are a customer of at least one other ISP. Hence, in many cases, the ISP could substantially shrink the FIB size on its routers by applying ViAggre to the small number of prefixes advertised by their customers and peers while using default routes for the rest of the prefixes. V. Deployment To verify the claim that ViAggre is a configurationonly solution, we deployed both ViAggre designs on a small network built on the WAIL testbed [3]. The test network is shown in figure 8 and represents an ISP with two PoPs. Each PoP has two Cisco 73 routers and a route-reflector. 4 For the ViAggre deployment, we use two virtual prefixes:.../ (VP) and 28.../ (VP2) with one router in each PoP serving as an aggregation point for each virtual prefix. Routers R and R4 have an external router connected to them and exchange routes using an ebgp peering. Specifically, router R advertises the entire DFZ routing table and this is, in turn, advertised through the ISP to router R6. We use OSPF for intra-domain routing. Beyond this, we configure the internal distribution of BGP routes according to the following three approaches: ). Status Quo. The routers use a mesh of ibgp peerings to exchange the routes and hence, each router maintains the entire routing table. 2). Design-I. The routers still use a mesh of ibgp peerings to exchange routes. Beyond this, the routers are configured as follows: Virtual Prefixes. Routers advertise the virtual prefix they are aggregating to their ibgp peers. FIB Suppression. Each router only loads the routes that it is aggregating into its FIB. For instance, router R uses an access-list to specify that only routes belonging to VP, the virtual prefix VP2 itself and any popular prefixes are loaded into the FIB. A snippet of this access-list is shown below.! R s IP address is distance ! Don t mark anything inside.../ access-list deny ! Don t mark virtual prefix 28.../ access-list deny ! Don t mark popular prefix 22.../24 access-list deny !... other popular prefixes follow...! Mark the rest with admin distance 2 access-list permit any Here, the distance command sets the administrative distance of all prefixes that are accepted by access-list to 2 and these routes are not loaded by the router into its FIB. LSPs to external routers. We use MPLS for the tunnels between routers. To this effect, LDP [] is enabled on the interfaces of all routers and establishes LSPs between the routers. Further, each edge router (R and R4) initiates a Downstream Unsolicited tunnel [] for each external router connected to them to all their IGP neighbors using LDP. This ensures that packets to an external router are forwarded using MPLS to the edge router which strips the MPLS header before forwarding them onwards. Given this setup and assuming no popular prefixes, routers R and R3 store 4.9% of today s routing table (7,943 prefixes that are in VP) while R2 and R4 store 9.%. 3). Design-II. The routers in a PoP peer with the routereflector of the PoP and the route-reflectors peer with each other. External routers R and R6 are reconfigured to have ebgp peerings with RR and RR2 respectively. The advertisement of virtual prefixes and the MPLS configuration is the same as above. Beyond this, the route-reflectors are configured to ensure that they only advertise the prefixes being aggregated by a router to it. For instance, RR uses a prefix-list to ensure that only prefixes belonging to VP, virtual prefix VP2 itself and popular prefixes are advertised to router R. The structure of this prefix-list is similar to the access-list 462 NSDI 9: 6th USENIX Symposium on Networked Systems Design and Implementation USENIX Association

Making Routers Last Longer with ViAggre

Making Routers Last Longer with ViAggre Making Routers Last Longer with ViAggre Hitesh Ballani, Paul Francis, Tuan Cao and Jia Wang Cornell University AT&T Labs Research Abstract This paper presents ViAggre (Virtual Aggregation), a configuration-only

More information

A Dirty-Slate Approach to Routing Scalability

A Dirty-Slate Approach to Routing Scalability 1 A Dirty-Slate Approach to Routing Scalability Hitesh Ballani, Paul Francis, Jia Wang and Tuan Cao Cornell University and ATT-Research Abstract This paper presents Virtual Aggregation, an architecture

More information

A Configuration-only Approach to FIB Reduction. Paul Francis Hitesh Ballani, Tuan Cao Cornell

A Configuration-only Approach to FIB Reduction. Paul Francis Hitesh Ballani, Tuan Cao Cornell A Configuration-only Approach to FIB Reduction Paul Francis Hitesh Ballani, Tuan Cao Cornell Virtual Aggregation An approach to shrinking FIBs (and RIBs) In interface-card FIB, maybe control-card RIB Works

More information

A configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell)

A configuration-only approach to shrinking FIBs. Prof Paul Francis (Cornell) A configuration-only approach to shrinking FIBs Prof Paul Francis (Cornell) 1 Virtual Aggregation An approach to shrinking FIBs (and RIBs) In routers, not in route reflectors Works with legacy routers

More information

Reducing FIB Size with Virtual Aggregation (VA)

Reducing FIB Size with Virtual Aggregation (VA) Reducing FIB Size with Virtual Aggregation (VA) Paul Francis, MPI-SWS Xiaohu Xu, Huawei, Hitesh Ballani, Cornell Dan Jen, UCLA Robert Raszuk, Cisco Lixia Zhang, UCLA ISPs often want to extend the life

More information

MPLS L3VPN. The MPLS L3VPN model consists of three kinds of devices: PE CE Site 2. Figure 1 Network diagram for MPLS L3VPN model

MPLS L3VPN. The MPLS L3VPN model consists of three kinds of devices: PE CE Site 2. Figure 1 Network diagram for MPLS L3VPN model is a kind of PE-based L3VPN technology for service provider VPN solutions. It uses BGP to advertise VPN routes and uses to forward VPN packets on service provider backbones. provides flexible networking

More information

Configuring MPLS L3VPN

Configuring MPLS L3VPN Contents Configuring MPLS L3VPN 1 MPLS L3VPN overview 1 Introduction to MPLS L3VPN 1 MPLS L3VPN concepts 2 MPLS L3VPN packet forwarding 5 MPLS L3VPN networking schemes 5 MPLS L3VPN routing information

More information

Lecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011

Lecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011 Lecture 4: Intradomain Routing CS 598: Advanced Internetworking Matthew Caesar February 1, 011 1 Robert. How can routers find paths? Robert s local DNS server 10.1.8.7 A 10.1.0.0/16 10.1.0.1 Routing Table

More information

MPLS VPN--Inter-AS Option AB

MPLS VPN--Inter-AS Option AB The feature combines the best functionality of an Inter-AS Option (10) A and Inter-AS Option (10) B network to allow a Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) service provider

More information

TBGP: A more scalable and functional BGP. Paul Francis Jan. 2004

TBGP: A more scalable and functional BGP. Paul Francis Jan. 2004 TBGP: A more scalable and functional BGP Paul Francis Jan. 2004 BGP: Border Gateway Protocol BGP is the top-level routing protocol in the Internet It holds the Internet together BGP allows routers to tell

More information

Configuring MPLS L3VPN

Configuring MPLS L3VPN Contents Configuring MPLS L3VPN 1 MPLS L3VPN overview 1 MPLS L3VPN concepts 2 MPLS L3VPN packet forwarding 4 MPLS L3VPN networking schemes 5 MPLS L3VPN routing information advertisement 8 Inter-AS VPN

More information

Routing Basics. ISP Workshops. Last updated 10 th December 2015

Routing Basics. ISP Workshops. Last updated 10 th December 2015 Routing Basics ISP Workshops Last updated 10 th December 2015 1 Routing Concepts p IPv4 & IPv6 p Routing p Forwarding p Some definitions p Policy options p Routing Protocols 2 IPv4 p Internet still uses

More information

Dynamics of Hot-Potato Routing in IP Networks

Dynamics of Hot-Potato Routing in IP Networks Dynamics of Hot-Potato Routing in IP Networks Jennifer Rexford AT&T Labs Research http://www.research.att.com/~jrex Joint work with Renata Teixeira (UCSD), Aman Shaikh (AT&T), and Timothy Griffin (Intel)

More information

Routing Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols

Routing Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols Routing Basics 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 Addresses are 32 bits long Range from 1.0.0.0 to 223.255.255.255 0.0.0.0

More information

MPLS VPN C H A P T E R S U P P L E M E N T. BGP Advertising IPv4 Prefixes with a Label

MPLS VPN C H A P T E R S U P P L E M E N T. BGP Advertising IPv4 Prefixes with a Label 7 C H A P T E R S U P P L E M E N T This online supplement of Chapter 7 focuses on two important developments. The first one is Inter-Autonomous. Inter-Autonomous is a concept whereby two service provider

More information

MPLS VPN Inter-AS Option AB

MPLS VPN Inter-AS Option AB First Published: December 17, 2007 Last Updated: September 21, 2011 The feature combines the best functionality of an Inter-AS Option (10) A and Inter-AS Option (10) B network to allow a Multiprotocol

More information

IPv6 Module 6x ibgp and Basic ebgp

IPv6 Module 6x ibgp and Basic ebgp IPv6 Module 6x ibgp and Basic ebgp Objective: Using IPv6, simulate four different interconnected ISP backbones using a combination of IS-IS, internal BGP, and external BGP. Topology : Figure 1 BGP AS Numbers

More information

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN Platformă de e-learning și curriculă e-content pentru învățământul superior tehnic Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN MPLS VPN 5-ian-2010 What this lecture is about: IP

More information

The Case for Separating Routing from Routers

The Case for Separating Routing from Routers The Case for Separating Routing from Routers Nick Feamster, Hari Balakrishnan M.I.T. Computer Science and Artificial Intelligence Laboratory Jennifer Rexford, Aman Shaikh, Kobus van der Merwe AT&T Labs

More information

Multi Topology Routing Truman Boyes

Multi Topology Routing Truman Boyes Multi Topology Routing Truman Boyes truman@juniper.net Copyright 2008 Juniper Networks, Inc. 1 Traffic Engineering Choices Today: IGP Metric Costing RSVP TE end to end Policy based routing EROs, Offline

More information

Routing Basics ISP/IXP Workshops

Routing Basics ISP/IXP Workshops Routing Basics ISP/IXP Workshops 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 addresses are 32 bits long range from 1.0.0.0 to

More information

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER CHAPTER 23 Tag Switching Background Rapid changes in the type (and quantity) of traffic handled by the Internet and the explosion in the number of Internet users is putting an unprecedented strain on the

More information

Service Provider Multihoming

Service Provider Multihoming Service Provider Multihoming ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last

More information

Routing Basics. ISP Workshops

Routing Basics. ISP Workshops Routing Basics ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated 26

More information

Routing Basics. Routing Concepts. IPv4. IPv4 address format. A day in a life of a router. What does a router do? IPv4 Routing

Routing Basics. Routing Concepts. IPv4. IPv4 address format. A day in a life of a router. What does a router do? IPv4 Routing Routing Concepts IPv4 Routing Routing Basics ISP/IXP Workshops Forwarding Some definitions Policy options Routing Protocols 1 2 IPv4 IPv4 address format Internet uses IPv4 addresses are 32 bits long range

More information

Measuring BGP. Geoff Huston. CAIA SEMINAR 31 May

Measuring BGP. Geoff Huston. CAIA SEMINAR 31 May Measuring BGP Geoff Huston BGP is An instance of the Bellman-Ford Distance Vector family of routing protocols And a relatively vanilla one at that The routing protocol used to support inter-domain routing

More information

WAN Edge MPLSoL2 Service

WAN Edge MPLSoL2 Service 4 CHAPTER While Layer 3 VPN services are becoming increasing popular as a primary connection for the WAN, there are a much larger percentage of customers still using Layer 2 services such Frame-Relay (FR).

More information

Introduction to Segment Routing

Introduction to Segment Routing Segment Routing (SR) is a flexible, scalable way of doing source routing. Overview of Segment Routing, page 1 How Segment Routing Works, page 2 Examples for Segment Routing, page 3 Benefits of Segment

More information

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 05 MULTIPROTOCOL LABEL SWITCHING (MPLS) AND LABEL DISTRIBUTION PROTOCOL (LDP) 1 by Xantaro IP Routing In IP networks, each router makes an independent

More information

Implementing MPLS Layer 3 VPNs

Implementing MPLS Layer 3 VPNs A Multiprotocol Label Switching (MPLS) Layer 3 Virtual Private Network (VPN) consists of a set of sites that are interconnected by means of an MPLS provider core network. At each customer site, one or

More information

IPv6 Module 6 ibgp and Basic ebgp

IPv6 Module 6 ibgp and Basic ebgp ISP Workshop Lab IPv6 Module 6 ibgp and Basic ebgp Objective: Using IPv6, simulate four different interconnected ISP backbones using a combination of ISIS, internal BGP, and external BGP. Prerequisites:

More information

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30 Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30 R1. Let s review some of the terminology used in this textbook. Recall that

More information

A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering

A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering Hema T. Kaur, Shivkumar Kalyanaraman ECSE Department, Rensselaer Polytechnic Institute, Troy, NY-12180 {hema,shivkuma}@networks.ecse.rpi.edu

More information

IPv6 Switching: Provider Edge Router over MPLS

IPv6 Switching: Provider Edge Router over MPLS Multiprotocol Label Switching (MPLS) is deployed by many service providers in their IPv4 networks. Service providers want to introduce IPv6 services to their customers, but changes to their existing IPv4

More information

Advanced Multihoming. BGP Traffic Engineering

Advanced Multihoming. BGP Traffic Engineering Advanced Multihoming BGP Traffic Engineering 1 Service Provider Multihoming Previous examples dealt with loadsharing inbound traffic Of primary concern at Internet edge What about outbound traffic? Transit

More information

IPv6 Switching: Provider Edge Router over MPLS

IPv6 Switching: Provider Edge Router over MPLS Multiprotocol Label Switching (MPLS) is deployed by many service providers in their IPv4 networks. Service providers want to introduce IPv6 services to their customers, but changes to their existing IPv4

More information

MPLS VPN. 5 ian 2010

MPLS VPN. 5 ian 2010 MPLS VPN 5 ian 2010 What this lecture is about: IP CEF MPLS architecture What is MPLS? MPLS labels Packet forwarding in MPLS MPLS VPNs 3 IP CEF & MPLS Overview How does a router forward packets? Process

More information

Internet Routing. Shortest-Path Routing. Intra-Domain Routing and Traffic Engineering. Two-Tiered Internet Routing System

Internet Routing. Shortest-Path Routing. Intra-Domain Routing and Traffic Engineering. Two-Tiered Internet Routing System Intra-Domain Routing and Traffic Engineering Review of Internet routing paradigm and routing algorithms/protocols Intra-domain routing design topology design, convergence, stability, Traffic Engineering

More information

Service Provider Multihoming

Service Provider Multihoming Service Provider Multihoming ISP Workshops Last updated 18 September 2013 1 Service Provider Multihoming p Previous examples dealt with loadsharing inbound traffic n Of primary concern at Internet edge

More information

BGP Routing inside an AS

BGP Routing inside an AS Hot Potatoes Heat Up BGP Routing Renata Teixeira (UC San Diego) http://www-cse.ucsd.edu/~teixeira with Aman Shaikh (AT&T), Tim Griffin(Intel), and Jennifer Rexford(AT&T) 30 th NANOG Miami, Florida BGP

More information

CS 43: Computer Networks. 24: Internet Routing November 19, 2018

CS 43: Computer Networks. 24: Internet Routing November 19, 2018 CS 43: Computer Networks 24: Internet Routing November 19, 2018 Last Class Link State + Fast convergence (reacts to events quickly) + Small window of inconsistency Distance Vector + + Distributed (small

More information

Making an AS Act Like a Single Node: Toward Intrinsically Correct Interdomain Routing

Making an AS Act Like a Single Node: Toward Intrinsically Correct Interdomain Routing Making an AS Act Like a Single Node: Toward Intrinsically Correct Interdomain Routing Rui Zhang-Shen, Yi Wang, and Jennifer Rexford Princeton University ABSTRACT Although interconnecting independently-administered

More information

Test 1: NET3012 IP Architectures & Solutions Winter 2016

Test 1: NET3012 IP Architectures & Solutions Winter 2016 Test 1: NET3012 IP Architectures & Solutions Winter 2016 Time: 60 minutes; Test scored out of: 48 Total Marks available: 52 (Allocation of marks is shown beside each question) Instructions: 1. BEFORE answering

More information

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017 CS 43: Computer Networks Internet Routing Kevin Webb Swarthmore College November 16, 2017 1 Hierarchical routing Our routing study thus far - idealization all routers identical network flat not true in

More information

CCBOOTCAMP s CCIE Service Provider Core Knowledge Workbook

CCBOOTCAMP s CCIE Service Provider Core Knowledge Workbook CCBOOTCAMP s CCIE Service Provider Core Knowledge Workbook for the CCIE Service Provider Lab Exam For questions about this workbook please visit: www.routerie.com CCBOOTCAMP 375 N. Stephanie Street Building

More information

What You Will Learn By the end of this appendix, you should know and be able to explain the following:

What You Will Learn By the end of this appendix, you should know and be able to explain the following: What You Will Learn By the end of this appendix, you should know and be able to explain the following: What static MPLS labels are and how they can be used The difference between static MPLS bindings and

More information

IP Addressing & Interdomain Routing. Next Topic

IP Addressing & Interdomain Routing. Next Topic IP Addressing & Interdomain Routing Next Topic IP Addressing Hierarchy (prefixes, class A, B, C, subnets) Interdomain routing Application Presentation Session Transport Network Data Link Physical Scalability

More information

Inter-Domain Routing: BGP

Inter-Domain Routing: BGP Inter-Domain Routing: BGP Richard T. B. Ma School of Computing National University of Singapore CS 3103: Compute Networks and Protocols Inter-Domain Routing Internet is a network of networks Hierarchy

More information

Back to basics J. Addressing is the key! Application (HTTP, DNS, FTP) Application (HTTP, DNS, FTP) Transport. Transport (TCP/UDP) Internet (IPv4/IPv6)

Back to basics J. Addressing is the key! Application (HTTP, DNS, FTP) Application (HTTP, DNS, FTP) Transport. Transport (TCP/UDP) Internet (IPv4/IPv6) Routing Basics Back to basics J Application Presentation Application (HTTP, DNS, FTP) Data Application (HTTP, DNS, FTP) Session Transport Transport (TCP/UDP) E2E connectivity (app-to-app) Port numbers

More information

Routing Basics. Campus Network Design & Operations Workshop

Routing Basics. Campus Network Design & Operations Workshop Routing Basics Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

BGP Routing and BGP Policy. BGP Routing. Agenda. BGP Routing Information Base. L47 - BGP Routing. L47 - BGP Routing

BGP Routing and BGP Policy. BGP Routing. Agenda. BGP Routing Information Base. L47 - BGP Routing. L47 - BGP Routing BGP Routing and BGP Policy BGP Routing The BGP Routing Principles and Route Decisions based on AS-Path in a simple topology of AS s routing policy is reduced to a minimal function demonstrated in example

More information

Internet inter-as routing: BGP

Internet inter-as routing: BGP Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means to: 1. Obtain subnet reachability information from neighboring ASs. 2. Propagate the reachability

More information

Introduction. Keith Barker, CCIE #6783. YouTube - Keith6783.

Introduction. Keith Barker, CCIE #6783. YouTube - Keith6783. Understanding, Implementing and troubleshooting BGP 01 Introduction http:// Instructor Introduction Keith Barker, CCIE #6783 CCIE Routing and Switching 2001 CCIE Security 2003 kbarker@ine.com YouTube -

More information

Cisco Training - HD Telepresence MPLS: Implementing Cisco MPLS V3.0. Upcoming Dates. Course Description. Course Outline

Cisco Training - HD Telepresence MPLS: Implementing Cisco MPLS V3.0. Upcoming Dates. Course Description. Course Outline Cisco Training - HD Telepresence MPLS: Implementing Cisco MPLS V3.0 From the technology basics to advanced VPN configuration. $3,995.00 5 Days Upcoming Dates Dec 10 - Dec 14 Mar 25 - Mar 29 Course Description

More information

Deploy MPLS L3 VPN. APNIC Technical Workshop October 23 to 25, Selangor, Malaysia Hosted by:

Deploy MPLS L3 VPN. APNIC Technical Workshop October 23 to 25, Selangor, Malaysia Hosted by: Deploy MPLS L3 VPN APNIC Technical Workshop October 23 to 25, 2017. Selangor, Malaysia Hosted by: Issue Date: [201609] Revision: [01] Acknowledgement Cisco Systems Course Outline MPLS L3 VPN Models L3

More information

Routing Basics ISP/IXP Workshops

Routing Basics ISP/IXP Workshops Routing Basics ISP/IXP Workshops 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 addresses are 32 bits long range from 1.0.0.0 to

More information

This appendix contains supplementary Border Gateway Protocol (BGP) information and covers the following topics:

This appendix contains supplementary Border Gateway Protocol (BGP) information and covers the following topics: Appendix C BGP Supplement This appendix contains supplementary Border Gateway Protocol (BGP) information and covers the following topics: BGP Route Summarization Redistribution with IGPs Communities Route

More information

Lecture 13: Traffic Engineering

Lecture 13: Traffic Engineering Lecture 13: Traffic Engineering CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster Lecture 13 Overview Evolution of routing in the ARPAnet Today s TE: Adjusting

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 12: Inter-domain routing Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

TO CONTROL the flow of traffic through their networks,

TO CONTROL the flow of traffic through their networks, IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 2, APRIL 2007 253 Network-Wide Prediction of BGP Routes Nick Feamster and Jennifer Rexford, Senior Member, IEEE Abstract This paper presents provably correct

More information

Egress Protection (draft-shen-mpls-egress-protection-framework) Presented by Krzysztof G. Szarkowicz NANOG71 October 4, 2017

Egress Protection (draft-shen-mpls-egress-protection-framework) Presented by Krzysztof G. Szarkowicz NANOG71 October 4, 2017 Egress Protection (draft-shen-mpls-egress-protection-framework) Presented by Krzysztof G. Szarkowicz NANOG71 October 4, 2017 Current status draft-shen-mpls-egress-protection-framework-05 Co-authored by

More information

Network-Wide Prediction of BGP Routes

Network-Wide Prediction of BGP Routes Network-Wide Prediction of BGP Routes Nick Feamster Jennifer Rexford Georgia Tech Princeton University feamster@cc.gatech.edu jrex@cs.princeton.edu Abstract This paper presents provably correct algorithms

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology internet technologies and standards Piotr Gajowniczek BGP (Border Gateway Protocol) structure of the Internet Tier 1 ISP Tier 1 ISP Google

More information

CS118 Discussion Week 7. Taqi

CS118 Discussion Week 7. Taqi CS118 Discussion Week 7 Taqi Outline Hints for project 2 Lecture review: routing About Course Project 2 Please implement byte-stream reliable data transfer Cwnd is in unit of bytes, not packets How to

More information

MPLS VPN Explicit Null Label Support with BGP. BGP IPv4 Label Session

MPLS VPN Explicit Null Label Support with BGP. BGP IPv4 Label Session MPLS VPN Explicit Null Label Support with BGP IPv4 Label Session The MPLS VPN Explicit Null Label Support with BGP IPv4 Label Session feature provides a method to advertise explicit null in a Border Gateway

More information

Shim6: Network Operator Concerns. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI

Shim6: Network Operator Concerns. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Shim6: Network Operator Concerns Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Not Currently Supporting IPv6? Many parties are going forward with IPv6 Japan

More information

Multihoming Complex Cases & Caveats

Multihoming Complex Cases & Caveats Multihoming Complex Cases & Caveats ISP Workshops Last updated 6 October 2011 Complex Cases & Caveats p Complex Cases n Multiple Transits n Multi-exit backbone n Disconnected Backbone n IDC Multihoming

More information

COMP/ELEC 429 Introduction to Computer Networks

COMP/ELEC 429 Introduction to Computer Networks COMP/ELEC 429 Introduction to Computer Networks Lecture 11: Inter-domain routing Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at

More information

Solving the Routing Scalability Problem -- The Hard Parts. Jari Arkko APRICOT 2007, Bali, Indonesia

Solving the Routing Scalability Problem -- The Hard Parts. Jari Arkko APRICOT 2007, Bali, Indonesia Solving the Routing Scalability Problem -- The Hard Parts Jari Arkko APRICOT 2007, Bali, Indonesia Outline Where are we on this? Some hard bits Proposed plan of action Where Are We on This? There is a

More information

IP Fast Reroute Applicability. Pierre Francois Institute IMDEA Networks

IP Fast Reroute Applicability. Pierre Francois Institute IMDEA Networks IP Fast Reroute Applicability Pierre Francois Institute IMDEA Networks Pierre.Francois@imdea.org Agenda IGP (Fast) Convergence IGP Fast Reroute (Hitless maintenance operations) IGP Fast convergence Pushing

More information

Scaling the Inter-Domain Routing System

Scaling the Inter-Domain Routing System Scaling the Inter-Domain Routing System Kaustubh Gadkari Computer Science Department Colorado State University kaustubh@cs.colostate.edu Abstract The Internet inter-domain routing system is facing scalability

More information

MPLS Core Networks Николай Милованов/Nikolay Milovanov

MPLS Core Networks Николай Милованов/Nikolay Milovanov Label Assignment and Distribution Николай Милованов/Nikolay Milovanov Contents Label Assignment and Distribution Typical Label Distribution in Packet-mode MPLS Convergence in Packet-mode MPLS MPLS Label

More information

Cisco Evolved Programmable Network Implementation Guide for Large Network with End-to-End Segment Routing, Release 5.0

Cisco Evolved Programmable Network Implementation Guide for Large Network with End-to-End Segment Routing, Release 5.0 Cisco Evolved Programmable Network Implementation Guide for Large Network with End-to-End Segment Routing, Release 5.0 First Published: 2017-06-22 Americas Headquarters Cisco Systems, Inc. 170 West Tasman

More information

Examination. ANSWERS IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491

Examination. ANSWERS IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491 Examination ANSWERS IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491 Date: October 21st 2008 10:00 13:00 a) No help material is allowed

More information

CS4450. Computer Networks: Architecture and Protocols. Lecture 15 BGP. Spring 2018 Rachit Agarwal

CS4450. Computer Networks: Architecture and Protocols. Lecture 15 BGP. Spring 2018 Rachit Agarwal CS4450 Computer Networks: Architecture and Protocols Lecture 15 BGP Spring 2018 Rachit Agarwal Autonomous System (AS) or Domain Region of a network under a single administrative entity Border Routers Interior

More information

Internet Routing Protocols Lecture 01 & 02

Internet Routing Protocols Lecture 01 & 02 Internet Routing Protocols Lecture 01 & 02 Advanced Systems Topics Lent Term, 2010 Timothy G. Griffin Computer Lab Cambridge UK Internet Routing Outline Lecture 1 : Inter-domain routing architecture, the

More information

FIGURE 3. Two-Level Internet Address Structure. FIGURE 4. Principle Classful IP Address Formats

FIGURE 3. Two-Level Internet Address Structure. FIGURE 4. Principle Classful IP Address Formats Classful IP Addressing When IP was first standardized in September 1981, the specification required that each system attached to an IP-based Internet be assigned a unique, 32-bit Internet address value.

More information

Design, Deployment and Troubleshooting Scalable MPLS Architecture (Platform : IOS-XR, IOS-XE)

Design, Deployment and Troubleshooting Scalable MPLS Architecture (Platform : IOS-XR, IOS-XE) Design, Deployment and Troubleshooting Scalable MPLS Architecture (Platform : IOS-XR, IOS-XE) Vinit Jain, Technical Leader Services CCIE # 22854 Twitter @vinugenie Shashi Shekhar Sharma, Customer Advocacy

More information

Interdomain Routing. Networked Systems (H) Lecture 11

Interdomain Routing. Networked Systems (H) Lecture 11 Interdomain Routing Networked Systems (H) Lecture 11 Lecture Outline Interdomain routing Autonomous systems and the Internet AS-level topology BGP and Internet routing 2 Interdomain Unicast Routing Tier-1

More information

BGP for Internet Service Providers

BGP for Internet Service Providers BGP for Internet Service Providers Philip Smith Seoul KIOW 2002 1 BGP current status RFC1771 is quite old, and no longer reflects current operational practice nor vendor implementations

More information

Module 6 ibgp and Basic ebgp

Module 6 ibgp and Basic ebgp ISP Workshop Lab Module 6 ibgp and Basic ebgp Objective: Simulate four different interconnected ISP backbones using a combination of IS-IS, internal BGP, and external BGP. Prerequisites: Module 1 (IS-IS)

More information

Multiprotocol Label Switching Virtual Private Network

Multiprotocol Label Switching Virtual Private Network Anas Al-Selwi Multiprotocol Label Switching Virtual Private Network Helsinki Metropolia University of Applied Sciences Bachelor of Engineering Information Technology Thesis 08 May 2013 Abstract Author(s)

More information

CS519: Computer Networks. Lecture 4, Part 5: Mar 1, 2004 Internet Routing:

CS519: Computer Networks. Lecture 4, Part 5: Mar 1, 2004 Internet Routing: : Computer Networks Lecture 4, Part 5: Mar 1, 2004 Internet Routing: AS s, igp, and BGP As we said earlier, the Internet is composed of Autonomous Systems (ASs) Where each AS is a set of routers, links,

More information

THE Internet is an interconnection of separately administered

THE Internet is an interconnection of separately administered SPRINT ATL RESEARCH REPORT RR3-ATL-51677 - MAY 23 1 A Study of the Impact of BGP Dynamics on Intra-Domain Sharad Agarwal Chen-Nee Chuah Supratik Bhattacharyya Christophe Diot CS Division, ECE Department,

More information

Multiprotocol Label Switching (MPLS) on Cisco Routers

Multiprotocol Label Switching (MPLS) on Cisco Routers Multiprotocol Label Switching (MPLS) on Cisco Routers This document describes commands for configuring and monitoring Multiprotocol Label Switching (MPLS) functionality on Cisco routers and switches. This

More information

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 14, 2013

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 14, 2013 CS 43: Computer Networks Internet Routing Kevin Webb Swarthmore College November 14, 2013 1 Reading Quiz Hierarchical routing Our routing study thus far - idealization all routers identical network flat

More information

A FRESH LOOK AT SCALABLE FORWARDING THROUGH ROUTER FIB CACHING. Kaustubh Gadkari, Dan Massey and Christos Papadopoulos

A FRESH LOOK AT SCALABLE FORWARDING THROUGH ROUTER FIB CACHING. Kaustubh Gadkari, Dan Massey and Christos Papadopoulos A FRESH LOOK AT SCALABLE FORWARDING THROUGH ROUTER FIB CACHING Kaustubh Gadkari, Dan Massey and Christos Papadopoulos Problem: RIB/FIB Growth Global RIB directly affects FIB size FIB growth is a big concern:

More information

CS 457 Networking and the Internet. The Global Internet (Then) The Global Internet (And Now) 10/4/16. Fall 2016

CS 457 Networking and the Internet. The Global Internet (Then) The Global Internet (And Now) 10/4/16. Fall 2016 CS 457 Networking and the Internet Fall 2016 The Global Internet (Then) The tree structure of the Internet in 1990 The Global Internet (And Now) A simple multi-provider Internet 1 The Global Internet Some

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way \ http://www.pass4test.com We offer free update service for one year Exam : 642-691 Title : CCIP BGP + MPLS Exam (BGP + MPLS) Vendors : Cisco Version

More information

2610:f8:ffff:2010:04:13:0085:1

2610:f8:ffff:2010:04:13:0085:1 2610:f8:ffff:2010:04:13:0085:1 Qwest IPv6 Implementation Experience Shawn Carroll 2610:f8:ffff:2010:04:13:0085:55 Previous Qwest Implementation Work Obtained 6bone Pseudo Next Level Aggregator (pnla) from

More information

1 Introduction. AT&T Labs - Research. Jay Borkenhagen Dept. HA MT C5-3D

1 Introduction. AT&T Labs - Research. Jay Borkenhagen Dept. HA MT C5-3D AT&T Labs - Research subject: Controlling the Impact of BGP Policy Changes on IP Traffic date: November 6, 2001 from: Nick Feamster MIT feamster@lcs.mit.edu Jay Borkenhagen Dept. HA9215000 MT C5-3D12 732-420-2526

More information

IBGP scaling: Route reflectors and confederations

IBGP scaling: Route reflectors and confederations DD2491 p2 2009/2010 IBGP scaling: Route reflectors and confederations Olof Hagsand KTH /CSC 1 Literature Route Reflectors Practical BGP pages 135 153 RFC 4456 Confederations Practical BGP pages 153 160

More information

Routing Support for Wide Area Network Mobility. Z. Morley Mao Associate Professor Computer Science and Engineering University of Michigan

Routing Support for Wide Area Network Mobility. Z. Morley Mao Associate Professor Computer Science and Engineering University of Michigan Routing Support for Wide Area Network Mobility Z. Morley Mao Associate Professor Computer Science and Engineering University of Michigan 1 Outline Introduction Inter-AS Mobility Support Intra-AS Mobility

More information

IPv6 Module 4 OSPF to IS-IS for IPv6

IPv6 Module 4 OSPF to IS-IS for IPv6 IPv6 Module 4 OSPF to IS-IS for IPv6 Objective: To migrate the OSPF version of Module 1 (running IPv4) to using IS-IS as part of an IPv6 migration strategy. OSPF will be completely removed once the migration

More information

MPLS: Layer 3 VPNs: Inter-AS and CSC Configuration Guide, Cisco IOS Release 15SY

MPLS: Layer 3 VPNs: Inter-AS and CSC Configuration Guide, Cisco IOS Release 15SY MPLS: Layer 3 VPNs: Inter-AS and CSC Configuration Guide, Cisco IOS Release 15SY First Published: October 15, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF MODULE 07 - MPLS BASED LAYER 2 SERVICES 1 by Xantaro MPLS BASED LAYER 2 VPNS USING MPLS FOR POINT-TO-POINT LAYER 2 SERVICES 2 by Xantaro Why are Layer-2

More information

MPLS/Tag Switching. Background. Chapter Goals CHAPTER

MPLS/Tag Switching. Background. Chapter Goals CHAPTER 28 CHAPTER Chapter Goals Understand the advantages of MPLS. Learn the components of an MPLS system. Compare and contrast MPLS and hop-by-hop routing. Describe the two methods of label distribution. Explain

More information

Internet Routing Basics

Internet Routing Basics Internet Routing Basics Back to basics J Application Presentation Application (HTTP, DNS, FTP) Data Application (HTTP, DNS, FTP) Session Transport Transport (TCP/UDP) E2E connectivity (app-to-app) Port

More information

MPLS VPN Carrier Supporting Carrier Using LDP and an IGP

MPLS VPN Carrier Supporting Carrier Using LDP and an IGP MPLS VPN Carrier Supporting Carrier Using LDP and an IGP Multiprotocol Label Switching (MPLS) Virtual Private Network (VPN) Carrier Supporting Carrier (CSC) enables one MPLS VPN-based service provider

More information